{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T20:28:52Z","timestamp":1725654532474},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,9]]},"DOI":"10.1109\/sasow.2012.13","type":"proceedings-article","created":{"date-parts":[[2013,4,15]],"date-time":"2013-04-15T16:14:26Z","timestamp":1366042466000},"page":"15-22","source":"Crossref","is-referenced-by-count":12,"title":["A3: An Environment for Self-Adaptive Diagnosis and Immunization of Novel Attacks"],"prefix":"10.1109","author":[{"given":"Partha","family":"Pal","sequence":"first","affiliation":[]},{"given":"Richard","family":"Schantz","sequence":"additional","affiliation":[]},{"given":"Aaron","family":"Paulos","sequence":"additional","affiliation":[]},{"given":"Brett","family":"Benyo","sequence":"additional","affiliation":[]},{"given":"David","family":"Johnson","sequence":"additional","affiliation":[]},{"given":"Mike","family":"Hibler","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Eide","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2012.6263953"},{"journal-title":"Proc 5th USENIX NSDI 2008","article-title":"Wedge: Splitting Applications into Reduced-privilege Compartments","year":"0","author":"bittau","key":"17"},{"journal-title":"Proc OSDI 2010","article-title":"Intrusion Recovery Using Selective Re-Execution","year":"0","author":"kim","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"year":"0","key":"16"},{"year":"0","key":"13"},{"journal-title":"Qubes OS Architecture","year":"0","author":"rutkowska","key":"14"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2090181.2090186"},{"year":"0","key":"21"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/spe.747"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945467"},{"journal-title":"Proc Usenix Lisa 99 Conf","article-title":"SNORT- Lightweight Intrusion Detection for Networks","year":"1999","author":"roesch","key":"2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2004.54"},{"journal-title":"C4 5 Programs for Machine Learning","year":"1993","author":"quinlan","key":"10"},{"journal-title":"Proc 8th Int'l Conf on Autonomic and Autonomous Systems (ICAS-12) March 2012","article-title":"FUZZBUSTER: A System for Self-Adaptive Immunity from Cyber Threats","year":"0","author":"musliner","key":"7"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4614-0977-9_4","article-title":"Compiler-Generated Software Diversity","author":"jackson","year":"2011","journal-title":"Moving Target Defense Creating Asymmetric Uncertainty for Cyber Threats"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/BLISS.2008.17"},{"journal-title":"Proc EuroSys Workshop on Recent Advances in Intrusion Tolerant Systems Mar 2007","article-title":"The DPASA Survivable JBI- A High-water Mark in Intrusion Tolerant Systems","year":"0","author":"pal","key":"4"},{"journal-title":"Event Backtracking with Determinstic Replay and VMI","year":"0","author":"johnson","key":"9"},{"journal-title":"The A3 Dashboard and Experimentation Toolkit","year":"0","author":"paulos","key":"8"}],"event":{"name":"2012 IEEE Conference on Self-Adaptive and Self-Organizing Systems Workshops (SASOW)","start":{"date-parts":[[2012,9,10]]},"location":"Lyon, France","end":{"date-parts":[[2012,9,14]]}},"container-title":["2012 IEEE Sixth International Conference on Self-Adaptive and Self-Organizing Systems Workshops"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6497699\/6498360\/06498374.pdf?arnumber=6498374","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T07:22:17Z","timestamp":1498029737000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6498374\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,9]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/sasow.2012.13","relation":{},"subject":[],"published":{"date-parts":[[2012,9]]}}}